NIST Special Publication (SP) 800-207, Zero Trust Architecture
March 8, 2022
Nonprofit Cyber launches with mission to increase cybersecurity awareness
Security Magazine
March 4, 2022
5 Ways to Determine If You Do Cybersecurity or Cybersecurity Theater
Security Boulevard
March 2, 2022
Cloud security is too important to leave to cloud providers
ZDNet
February 28, 2022
Cybersecurity NPOs Form ‘Nonprofit Cyber’ Coalition
The Nonprofit Times
February 28, 2022
Responsible AI Deployment in Healthcare Requires Collaboration
Health IT Analytics
February 24, 2022
Nonprofits, Activate! Orgs Team Up to Tackle Cybersecurity Threats
PC Magazine
February 24, 2022
Nearly two dozen nonprofits form new coalition to collaborate, amplify good cyber advice
SC Magazine
February 23, 2022
AI in Healthcare Presents Need for Security, Privacy Standards
Health IT Security
February 17, 2022
Cloud Security Alliance publishes guidelines to bridge compliance and DevOps
Computer Weekly
February 16, 2022
New Cloud Security Alliance Report Highlights Factors to Consider When Designing Blockchain Solutions That Operate Within Critical Sectors
Crypto Reporter
February 16, 2022
Cloud Security Alliance Publishes Report on Blockchain Risk, Security Considerations
Crowdfund Insider
February 16, 2022
By Looking at the Past, New Cyber Board Can Prepare Us for the Future
Data Center Knowledge
February 15, 2022
New Guidelines From Cloud Security Alliance and SAFECode Help DevSecOps Teams Translate Security and Compliance Requirements Into the Development Cycle
StreetInsider
February 11, 2022
Organizations and the cloud: How they use it and how they secure it
HelpNet Security
February 11, 2022
Avoid the Hidden Challenges of Data Migration
Datanami
February 8, 2022
New Cloud Security Alliance Survey Finds Uneven Adoption Of Emerging Technologies
AIthority
February 4, 2022
Russia prepares deep fakes? Ransomware disrupts logistical services in Europe. A Chinese APT prospects European governments.
CyberWire
February 4, 2022
New Cloud Security Alliance Survey Finds Uneven Adoption Of Emerging Technologies
AiThority
February 4, 2022
The importance of a policy-driven threat modeling approach